Browse Definitions :

Browse Definitions by Alphabet

MEM - MIB

  • memory-scraping malware - Memory-scraping malware is a type of malware that helps hackers to find personal data.
  • memristor - A memristor is a type of resistor in which the flow of electrical current in an electronic circuit is determined by the amount of charge that has previously flowed through it.
  • MEMS - A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.
  • MEMS (micro-electromechanical systems) - A MEMS (micro-electromechanical system) is a miniature machine that has both mechanical and electronic components.
  • memtest86 - Memtest86 is an open source diagnostics utility for testing a computer's random access memory (RAM) on an x86 machine.
  • Mendix - Mendix is a low-code collaborative development platform for mobile and web-based applications.
  • mentor - A mentoring service is a company that provides professional counseling and advice for individuals and businesses for a fee.
  • mentoring service - A mentoring service is a company that provides professional counseling and advice for individuals and businesses for a fee.
  • menu - A menu is a set of options presented to the user of a computer application to help the user find information or execute a program function.
  • menu bar - The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.
  • MEO - A medium earth orbit (MEO) satellite is one with an orbit within the range from a few hundred miles to a few thousand miles above the earth's surface.
  • MEO satellite - A medium earth orbit (MEO) satellite is one with an orbit within the range from a few hundred miles to a few thousand miles above the earth's surface.
  • MEO satellite (medium earth orbit satellite) - A medium earth orbit (MEO) satellite is one with an orbit within the range from a few hundred miles to a few thousand miles above the earth's surface.
  • Merchant Customer Exchange (MCX) CurrentC - Merchant Customer Exchange (MCX) CurrentC is a mobile payments application backed by some of the nation's largest retailers including Target, Walmart, CVS, Best Buy and Rite Aid, as well as banks like Capital One.
  • mergers and acquisitions (M&A) - Mergers and acquisitions (M&A) is the area of corporate finances, management and strategy dealing with purchasing and/or joining with other companies.
  • Mersenne prime - A Mersenne (also spelled Marsenne) prime is a specific type of prime number.
  • Mersenne prime (or Marsenne prime) - A Mersenne (also spelled Marsenne) prime is a specific type of prime number.
  • MES - A manufacturing execution system (MES) is an information system that connects, monitors and controls complex manufacturing systems and data flows on the factory floor.
  • Mesh Connectivity Layer - Mesh Connectivity Layer (MCL) is a technology that allows a computer user to connect to a wireless mesh network that uses Wi-Fi or WiMax.
  • Mesh Connectivity Layer (MCL) - Mesh Connectivity Layer (MCL) is a technology that allows a computer user to connect to a wireless mesh network that uses Wi-Fi or WiMax.
  • mesh network topology (mesh network) - A mesh network is a network in which the devices -- or nodes -- are connected so that at least some, and sometimes all, have multiple paths to other nodes.
  • message - (Using e-mail, a message is an individual piece of mail.
  • message authentication code - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • message authentication code - A message authentication code (MAC) is a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data.
  • message authentication code (MAC) - A message authentication code (MAC) is a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data.
  • message board - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • message broker - In a telecommunication network where programs communicate by exchanging formally-defined messages (that is, through the act of messaging), a message broker is an intermediary program that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver.
  • message integrity code - A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed.
  • message passing interface (MPI) - The message passing interface (MPI) is a standardized means of exchanging messages between multiple computers running a parallel program across distributed memory.
  • message queueing - In programming, message queueing is a method by which process (or program instances) can exchange or pass data using an interface to a system-managed queue of messages.
  • Message Session Relay Protocol (MSRP) - Message Session Relay Protocol (MSRP) is a protocol for exchanging a series of related instant messages across an IP network in the context of a session.
  • message transfer agent - A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
  • message-driven processing - Message-driven processing is an approach used within the client/server computing model in which a client (for example, your Web browser) sends a service request in the form of a specially-formatted message to a program that acts as a request broker, handling messages from many clients intended for many different server applications.
  • messages - Here are:Three rules-of-thumb for dealing with Internet problemsA table showing the most common codes and messages you're likely to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a message saying the domain name server (DNS) can't find your page and you're sure you've typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes packets don't get there!)If you get a "Not found" message, the page may be temporarily missing because of miscoding at the target site.
  • messaging - In general, messaging (also called electronic messaging) is the creation, storage, exchange, and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data Interchange (EDI) over a communications network.
  • Messaging and Email Quizzes - We've gathered a collection of our quizzes about messaging and email-related topics.
  • Messaging Application Program Interface - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • messaging security - Messaging security is a subcategory of unified threat management (UTM) focused on securing and protecting an organization’s communication infrastructure.
  • messaging server - A messaging server is a middleware program that handles messages that are sent for use by other programs using a messaging application program interface (API).
  • messaging software - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • meta - Metadata is a description of data.
  • meta description tag - A meta description tag is the snippet of HTML code that belongs inside the header of a web page.
  • meta tag - A meta tag is a tag (that is, a coding statement) in the Hypertext Markup Language (HTML) that describes some aspect of the contents of a Web page.
  • metabase - A metabase (sometimes called a metadatabase or metadata repository) is a database for storing metadata (data that describes data) for a specific purpose.
  • metabase (metadatabase or metadata repository) - A metabase (sometimes called a metadatabase or metadata repository) is a database for storing metadata (data that describes data) for a specific purpose.
  • metacharacter - A metacharacter (sometimes spelled meta character or meta-character) is a special character in a program or data field that provides information about other characters.
  • metacognition - Metacognition is the ability to reflect on one’s own cognitive processes.
  • metacoin platform - Metacoin platform is the information technology infrastructure that enables digital currency and digital asset transactions.
  • metadata - Metadata is a description of data.
  • metadata - Metadata is data that describes other data.
  • metadata management - Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, analyzed and maintained to best effect across an organization.
  • metadata repository - A metabase (sometimes called a metadatabase or metadata repository) is a database for storing metadata (data that describes data) for a specific purpose.
  • metadata repository - A metadata repository is a database of data about data (metadata).
  • metadata security - Metadata is defined as “data about data.
  • metadatabase - A metabase (sometimes called a metadatabase or metadata repository) is a database for storing metadata (data that describes data) for a specific purpose.
  • metafile - A metafile is a file containing information that describes or specifies another file.
  • MetaFrame - MetaFrame is the name for a thin client/server software application from Citrix that is used to provide Microsoft's Windows Terminal Server product (WTS) with additional server and client functionality by allowing any client, no matter what operating system (OS) they are using, to connect to a Windows Terminal Server and run a Windows application through their browser.
  • metainformation - Metainformation is information about information.
  • metal oxide semiconductor field effect transistor - MOSFET (metal-oxide semiconductor field-effect transistor is a special type of field-effect transistor (FET) that works by electronically varying the width of a channel along which charge carriers (electrons or holes) flow.
  • metal-oxide semiconductor field-effect transistor - MOSFET (metal-oxide semiconductor field-effect transistor is a special type of field-effect transistor (FET) that works by electronically varying the width of a channel along which charge carriers (electrons or holes) flow.
  • metamorphic and polymorphic malware - Metamorphic and polymorphic malware are two categories of malicious programs that have the ability to change their code as they propagate.
  • Metamorphic virus - A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.
  • Metasploit Project - Metasploit Framework - The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code.
  • metasyntactic variable - In programming, a metasyntactic (which derives from meta and syntax) variable is a variable (a changeable value) that is used to temporarily represent a function.
  • Metcalfe's Law - Metcalfe's Law is expressed in two general ways: The number of possible cross-connections in a network grow as the square of the number of computers in the network increases.
  • meter - The meter (abbreviation, m; the British spelling is metre) is the International System of Units (SI) unit of displacement or length.
  • meter cubed - The cubic meter is the unit of volume in the International System of Units.
  • meter cubed per kilogram - The meter cubed per kilogram (symbolized m 3 /kg) is the standard unit of specific volume in the International System (SI).
  • meter per second - The meter per second (symbolized m/s or m/sec) is the Standard International (SI) unit of linear speed.
  • meter per second (m/s or m/sec) - The meter per second (symbolized m/s or m/sec) is the Standard International (SI) unit of linear speed.
  • meter per second squared - The meter per second squared (symbolized m/s 2 or m/sec 2) is the Standard International (SI) unit of acceleration vector magnitude.
  • meter squared - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
  • meter-kilogram-second system of units - The metric system is considered almost synonymous with the Standard International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS or mks) system.
  • metered services - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • metered services (pay-per-use) - Metered services (also called pay-per-use) is any type of payment structure in which a customer has access to potentially unlimited resources but only pays for what they actually use.
  • method - In object-oriented programming, a method is a programmed procedure that is defined as part of a class and included in any object of that class.
  • metric - In software development, a metric (noun) is the measurement of a particular characteristic of a program's performance or efficiency.
  • metric system - The metric system is considered almost synonymous with the Standard International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS or mks) system.
  • Metro apps - Metro apps are touch-screen-friendly apps written especially for Microsoft's WinRT programming interfaces.
  • Metro Ethernet - Metro Ethernet is the use of Carrier Ethernet technology in metropolitan area networks (MANs).
  • metropolitan area network - A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • metropolitan area network (MAN) - A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • mezzanine - Mezzanine is a term used to describe the stacking of computer component cards into a single card that then plugs into the computer bus or data path.
  • MFA - Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.
  • MFC - The Microsoft Foundation Class (MFC) Library is a collection of class es (generalized definitions used in object-oriented programming) that can be used in building application program s.
  • MFC Library - The Microsoft Foundation Class (MFC) Library is a collection of class es (generalized definitions used in object-oriented programming) that can be used in building application program s.
  • MFP - A multifunction peripheral (MFP) is a device that performs a variety of functions that would otherwise be carried out by separate peripheral devices.
  • MFSK - MFSK (multiple frequency shift keying), also called multi-frequency shift keying, is a method of signal modulation in which discrete audio tone bursts of various frequencies convey digital data.
  • MFSK (multiple frequency shift keying) - MFSK (multiple frequency shift keying), also called multi-frequency shift keying, is a method of signal modulation in which discrete audio tone bursts of various frequencies convey digital data.
  • MFSK16 - MFSK (multiple frequency shift keying), also called multi-frequency shift keying, is a method of signal modulation in which discrete audio tone bursts of various frequencies convey digital data.
  • MFT - The master file table (MFT) is a database in which information about every file and directory on an NT File System (NTFS) volume is stored.
  • MFT - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • MGCP - Media Gateway Control Protocol (MGCP), also known as H.
  • mHealth (mobile health) - mHealth (mobile health) is a general term for the use of mobile phones and other wireless technology in medical care.
  • mHealth Alliance - MHealth Alliance is non-profit organization hosted by the United Nations Foundation that focuses on advancing mHealth technology in global health care through policy research, advocacy and outreach.
  • mho - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • MHP - Multimedia Home Platform (MHP) is a digital video broadcasting (DVB) standard intended to combine digital television (DTV) with the Internet and the World Wide Web.
  • MHz - The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz).
  • MHz - The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz).
  • MIB - A management information base (MIB) is a formal description of a set of network objects that can be managed using the Simple Network Management Protocol (SNMP).

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close